• Information Security: Principles and Practices (2nd Edition) (Certification/Training)

    Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career.   Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains o... [Read More]

    • ASIN: 0789753251
    • ASIN: 0789753251
    • ISBN: 0789753251
    • Brand: Pearson IT Certification
    • Manufacturer: Pearson IT Certification

  • Penetration Testing: A Hands-On Introduction to Hacking

    Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the... [Read More]

    • ASIN: 1593275641
    • UPC: 884600461290
    • ASIN: 1593275641
    • ISBN: 1593275641
    • Brand: No Starch Press
    • Manufacturer: No Starch Press

  • Enterprise Mobility Suite Managing BYOD and Company-Owned Devices (IT Best Practices - Microsoft Press)

    Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy and corporate assets without compromising productivity. You’ll find best practices, step-by-step guidance, and real-world scenarios for every stage of planning, design, deployment, and administration. Empower your mobile users while improving sec... [Read More]

    • ASIN: 0735698406
    • ASIN: 0735698406
    • ISBN: 0735698406
    • Manufacturer: Microsoft Press

  • Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD (IT Best Practices - Microsoft Press)

    Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA). Plan, deploy, and deliver complete enterprise mobility while improving security Choose the right Microsoft enterprise mobility solution for your organization Prot... [Read More]

    • ASIN: 150930133X
    • ASIN: 150930133X
    • ISBN: 9781509301331
    • Brand: MICROSOFT PRESS
    • Manufacturer: Microsoft Press

  • Enterprise IoT: Strategies and Best Practices for Connected Products and Services

    Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models.With a set of best practices based on case study analysis, expert interviews, and the authors’ own experience, the Ignite | IoT Methodology outlined in this book delivers actionable guidelines to assist you with IoT strategy management and project execution. You’ll a... [Read More]

    • ASIN: 1491924837
    • ASIN: 1491924837
    • ISBN: 9781491924839
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Skype for Business Unleashed

    Skype for Business Unleashed This is the most comprehensive, realistic, and useful guide to Skype for  Business Server 2015, Microsoft’s most powerful unified communications system. Four leading Microsoft unified communications consultants share in-the-trenches guidance for planning, integration, migration, deployment, administration, and more.   The authors thoroughly introduce Skype for Business 2015’s components and capabilities, as well as changes and improvements associated with the integration of popular Skype consumer technologies. You’ll find detailed coverage of IP voic... [Read More]

    • ASIN: 0672338491
    • ASIN: 0672338491
    • ISBN: 9780672338496
    • Manufacturer: Sams Publishing

  • Networking All-in-One For Dummies

    Are you ready to build a network, but aren't sure where to start? Networking All-In-One For Dummies, 6th Edition walks you through the basics. With nine self-contained minibooks that feature the latest updates on networking trends, including revised content for Windows 10 and Windows Server 2016, as well as updated coverage of broadband technologies, storage, and back-up, this fully-updated text will become your go-to guide for network development. This easy-to-understand guide gives you everything you need to dive into the network development game. Networking entails the connection of two or ... [Read More]

    • ASIN: 1119154723
    • ASIN: 1119154723
    • ISBN: 1119154723
    • Brand: imusti
    • Manufacturer: For Dummies

  • Digital Forensics: Threatscape and Best Practices

    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bests... [Read More]

    • ASIN: 0128045264
    • ASIN: 0128045264
    • ISBN: 0128045264
    • Manufacturer: Syngress

  • Digital Forensics Explained

    The field of computer forensics has experienced significant growth recently and those looking to get into the industry have significant opportunity for upward mobility. Focusing on the concepts investigators need to know to conduct a thorough investigation, Digital Forensics Explained provides an overall description of the forensic practice from a practitioner’s perspective.Starting with an overview, the text describes best practices based on the author’s decades of experience conducting investigations and working in information technology. It illustrates the forensic process, explains wha... [Read More]

    • ASIN: 1439874956
    • ASIN: 1439874956
    • ISBN: 9781439874950
    • Manufacturer: Auerbach Publications

  • Mastering Skype for Business 2015

    Authoritative, hands-on guidance for Skype Business administrators Mastering Skype for Business 2015 gives administrators the comprehensive coverage they need to effectively utilize Skype for Business. Fully up to date for the 2015 release, this guide walks you through industry best practices for planning, design, configuration, deployment, and management with clear instruction and plenty of hands-on exercises. Case studies illustrate the real-world benefits of Unified Communication, and provide expert experiences working with Skype for Business. From server roles, infrastructure, topology, an... [Read More]

    • ASIN: 1119225353
    • ASIN: 1119225353
    • ISBN: 9781119225355
    • Brand: imusti
    • Manufacturer: Sybex

  • Bring Your Own Devices (BYOD) Survival Guide

    Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri

    • ASIN: B00OD4266U
    • ASIN: B00OD4266U
    • Manufacturer: Auerbach Publications

  • Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International ... 2007 (Lecture Notes in Computer Science)

    This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007. The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

    • ASIN: 3540723536
    • ASIN: 3540723536
    • ISBN: 3540723536
    • Brand: Brand: Springer
    • Manufacturer: Springer

  • Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, ... (Lecture Notes in Computer Science)

    This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

    • ASIN: 3662438259
    • UPC: 003662438259
    • ASIN: 3662438259
    • ISBN: 3662438259
    • Brand: Naccache David
    • Manufacturer: Springer

  • Java Programming: 24-Hour Trainer

    Quick and painless Java programming with expert multimedia instruction Java Programming 24-Hour Trainer, 2nd Edition is your complete beginner's guide to the Java programming language, with easy-to-follow lessons and supplemental exercises that help you get up and running quickly. Step-by-step instruction walks you through the basics of object-oriented programming, syntax, interfaces, and more, before building upon your skills to develop games, web apps, networks, and automations. This second edition has been updated to align with Java SE 8 and Java EE 7, and includes new information on GUI ba... [Read More]

    • ASIN: 111895145X
    • ASIN: 111895145X
    • ISBN: 111895145X
    • Brand: Wrox Press
    • Manufacturer: Wrox

  • Diameter: New Generation AAA Protocol - Design, Practice, and Applications

    Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications. This book explains the place Diameter holds in global telecommunication networks and teaches system architects and designers how to incorporate Diameter into their network environments.  Diameter:... [Read More]

    • ASIN: 1118875907
    • ASIN: 1118875907
    • ISBN: 1118875907
    • Manufacturer: Wiley

  • Analysis of Current Mobile Marketing Applications, Selected Best Practices and Future Development - eBook

    Master's Thesis from the year 2010 in the subject Business economics - Marketing, Corporate Communication, CRM, Market Research, Social Media, grade: 1.3, University of Applied Sciences Giessen, language: English, abstract: This study fundamentally attempts to

    • UPC: 413939215

  • Getting Started with iPhone SDK, Android and others: Mobile Application Development - Create your Mobile Applications Best Practices Guide - eBook

    This book covers the known relative differences between the most popular mobile platform development options for handheld devices such as personal digital assistants, enterprise digital assistants or mobile phones. It helps guide developers in choosing

    • UPC: 418621219

  • Analysis of Current Mobile Marketing Applications, Selected Best Practices and Future Development

    Analysis of Current Mobile Marketing Applications, Selected Best Practices and Future

    • UPC: 788595201

  • Getting Started with iPhone SDK, Android and Others : Mobile Application Development - Create Your Mobile Applications Best Practices Guide

    Getting Started with IPhone SDK, Android and Others: Mobile Application Development - Create Your Mobile Applications Best Practices

    • UPC: 10963856

  • Community Policing - A European Perspective : Strategies, Best Practices and Guidelines

    Details Coming Soon

    • UPC: 56085204

  • Android Application Security

    15 iPhone Security Best Practices | 4 Minute Tech

    Mobile App Security Best Practices for Developers